Next Article in Journal
Smart Pneumatic Artificial Muscle Using a Bend Sensor like a Human Muscle with a Muscle Spindle
Next Article in Special Issue
Hunting Network Anomalies in a Railway Axle Counter System
Previous Article in Journal
Isolation Improvement in Reflectarray Antenna-Based FMCW Radar Systems
Previous Article in Special Issue
Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries

1
Data Science Institute, University of Galway, H91TK33 Galway, Ireland
2
Department of Computer Science, Munster Technological University, T12P928 Cork, Ireland
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(22), 8974; https://doi.org/10.3390/s22228974
Submission received: 14 October 2022 / Revised: 14 November 2022 / Accepted: 17 November 2022 / Published: 19 November 2022
(This article belongs to the Special Issue Cyber Security in Industry 4.0 and Beyond)

Abstract

:
The rapid development in manufacturing industries due to the introduction of IIoT devices has led to the emergence of Industry 4.0 which results in an industry with intelligence, increased efficiency and reduction in the cost of manufacturing. However, the introduction of IIoT devices opens up the door for a variety of cyber threats in smart industries. The detection of cyber threats against such extensive, complex, and heterogeneous smart manufacturing industries is very challenging due to the lack of sufficient attack traces. Therefore, in this work, a Federated Learning enabled Deep Intrusion Detection framework is proposed to detect cyber threats in smart manufacturing industries. The proposed FLDID framework allows multiple smart manufacturing industries to build a collaborative model to detect threats and overcome the limited attack example problem with individual industries. Moreover, to ensure the privacy of model gradients, Paillier-based encryption is used in communication between edge devices (representative of smart industries) and the server. The deep learning-based hybrid model, which consists of a Convolutional Neural Network, Long Short Term Memory, and Multi-Layer Perceptron is used in the intrusion detection model. An exhaustive set of experiments on the publically available dataset proves the effectiveness of the proposed framework for detecting cyber threats in smart industries over the state-of-the-art approaches.

1. Introduction

Industry 4.0 is a new phase of the industrial revolution that heavily relies on internet-connected hardware, automation, ML, and real-time data to enable the production process with negligible human intervention. The objective of Smart Manufacturing (SM) is to distinguish openings for mechanizing activities and use data analytics to further advance manufacturing performance. SM is a precise utilization of the Industrial Internet of Things (IIoT) [1]. IIoT comprises inserting sensors in the manufacturing system to collect statistics on their functional status and performance. The amalgamation of IIoT technology in manufacturing brings adaptability and greater efficacy of production in the industrial environment [2]. However, the introduction of IIoT in the industrial manufacturing process brings new challenges such as: security, physical damage, seamless integration, and skill gap [3,4,5]. SM industries are exposed to a variety of cyber attacks such as DoS, eavesdropping, ransomware, side channel, port scan, passive replay, malicious code injection, buffer overflow and many more [6].
When comparing the effects of these attacks on traditional IT systems and manufacturing systems, the results are catastrophic for manufacturing, because in manufacturing systems damages may include physical damage to the production system, physical environment and people. In Industry 4.0, as it is hard to identify the reason for the problem, possible sets of attacks and their effects are larger in smart manufacturing systems than in traditional IT systems [7].
Thus, this drives the need for new anomaly detection approaches using AI. As AI for cybersecurity tools has improved the robustness, resilience and response to cybersecurity attacks [8,9], by watching a network, i.e., monitoring traffic and events and identifying cybersecurity threats such as malware [7], software vulnerabilities [10], fraudulent payments and network intrusion detection [11]. It does this by modeling normal (and in some cases anomalous) behaviors and classifying events using either supervised or unsupervised learning techniques and issuing alerts when anomalous behavior is observed.

Vulnerabilities in Smart Manufacturing

To comprehend the potential attack vectors, one must first comprehend the system’s probable weaknesses. However, a lot of studies have been conducted to discover such vulnerabilities in smart manufacturing, but there will always be a new set of vulnerabilities that demand the development of advanced detection systems. Manufacturing systems are designed without considering security. It may be pre-assumed that these systems are isolated, so will not be subjected to security attacks. Hardware and software security is not considered while building these systems. As with the lack of literature and understanding related to vulnerabilities in SM, it can only be understood based on the behavior of other systems when they are attacked.
This shows that there is a high need, and also increased interest, observed in the literature to address such issues in smart manufacturing. The state of art approaches show their diversion towards using AI-based threat detection approaches in the past few years. Intrusion detection is the most commonly used method in IIoT to detect the presence of an attack so as to minimize its effects [12]. However, huge data produced by IIoT devices have become a tough task to be handled with such anomaly detection techniques. Some other examples are [13] used Q-learning to handle threats in software-defined IIoT. In [8], the author proposed a deep learning-based solution to detect attacks in smart grid CPS. Further related work on cyber threat detection in smart manufacturing is discussed under Section 2.
It is found that AI-based threat detection techniques used in SM, unfortunately, rely on the fact that there is always a large number of examples of various cyber threats available to build a high-quality intrusion detection model. However, in reality, one SM industry will have only a limited number of cyber threat examples to build the model which is quite challenging. Moreover, the owners of SM industries are not willing to share their information and data with each other to build a high-quality comprehensive model due to privacy concerns. So, in such a scenario, it is quite difficult and an intractable task to build a high-quality model to detect cyber threats in SM industries.
To address such issues, a novel distributed learning-based FL is utilized. FL enables collaborative decentralized training of an intrusion detection model [14,15,16]. In FL, the model gradients are optimized collectively by a substantial number of edge devices without disclosing their personal data. Therefore, in this work, we propose an FL-enabled deep intrusion detection framework to detect cyber threats in SM industries. In the proposed FL-enabled framework, the Deep Intrusion Detection model is used to detect cyber threats using a hybrid CNN+LSTM+MLP model. Moreover, to ensure the privacy of model gradients and to handle FL-based attacks Paillier encryption is used. The main contributions of this paper are:
  • Developed a federated learning-enabled framework to construct a comprehensive intrusion detection model which can collaboratively train the model on multiple data from different industries without disclosing it to each other. As data does not leave the premises, thus data privacy is also achieved.
  • A proposed Deep Intrusion Detection model for cyber threat detection in SM using CNN, LSTM, and MLP. The proposed model is proven to be efficient in detecting cyber threats and incorporated with the federated learning framework.
  • Proposed a Paillier-based encryption to provide secure communication throughout the training process, in order to safeguard the privacy of model gradients and to handle the threats against the federated learning framework.
  • Tests carried out on an IIoT-based dataset using the proposed FLDID framework to prove its effectiveness in the industrial environment as well.
The rest of the paper is organized as: the present approaches used for cyber threat detection are discussed in Section 2. The system model, assumptions made and threat model considered in this paper are presented in Section 3. Section 4 describes the material and methods used and Section 5 shows the evaluation of the proposed framework and discusses the observations and results. Finally, Section 6 presents the conclusion and discusses the future work.

2. Related Work

Recent research has shown a tremendous increase in interest in addressing the issues of cybersecurity in smart manufacturing industries. Therefore, many researchers are focusing on developing AI-based Network Intrusion Detection Systems for smart manufacturing industries. These Intrusion Detection Systems monitor and detect intrusions across the industrial network. The IDS are broadly classified into signature-based IDS and anomaly-based IDS. Anomaly-based IDS have gained major attention for intrusion detection, due to their capability for identifying novel attacks from complex and heterogeneous data generated from the IIoT devices in SM industries [17].
In the literature, there exist a wide range of anomaly detection methods proposed for cybersecurity in traditional networks [18,19,20,21]. However, these existing anomaly detection methods are not compatible with the new Industry 4.0 environment and do not achieve good accuracy. Therefore, to improve the accuracy of such systems while handling complex and heterogeneous data in SM industries, ML techniques have been employed [22]. For example, [23] investigates the problem of intrusion detection and offers a solution based on decision trees. In the paper [24], the author proposed a Gaussian Naive Bayes with LSTM model to identify two different types of abnormalities. One is hardware anomalies, particularly those produced by various types of sensors, which may have issues including interference from the environment, device malfunction, and misreadings. Another is software anomalies, which can result in aberrant or altered data gathering due to programme exceptions, transmission faults, and malicious attacks. For the purpose of detecting DDoS in IoT networks, the author [25] used a number of ML techniques and attains high detection accuracy by utilizing network behaviors for the feature selection process. Another study developed a framework for anomaly detection [26] that utilized both a temporal-spatial model and a logging-tracing model to identify anomalies in network traffic.
Deep learning methods have recently produced impressive results and emerged as one of the successful ways for intrusion detection systems. A variety of deep learning approaches to security monitoring were reviewed by the author [27]. They contrasted common deep learning models with a few traditional ML techniques. The findings in the review showed how useful deep learning techniques are for protecting against cybercrime. To specifically detect intrusions, the author [28] incorporated deep neural networks and used the KDD99 dataset to prove the efficacy of the proposed approach. A dense random neural network was constructed in another study [29] to identify cyberattacks. In contrast, in [30], the author discovered that a deep neural network with three hidden layers produced classification results that were superior to those achieved with more classes when fewer invasive classes were used.
All of these centralized learning techniques necessitate central storage (server) of all data acquired on local devices. This necessity not only increases concerns about threats pertaining to privacy and data leaks, although it also heavily requires the server’s storing and computational capacities when the data is large. However, the distributed approach allows multiple systems to train model replicas with different data groups in parallel to solve the above problem. However, it still requires access to the entire training data set in order to partition it into uniformly distributed shards, thereby causing security and privacy issues.
To overcome such a problem FL has appeared as an intriguing method. FL intends to develop a global model that can be trained on data spread across several devices while maintaining data privacy. Some of the research using FL are: In [31], the authors proposed a DNN-based client-server FL architecture. A large part of the suggested models achieved pretty good accuracy (99.00%) came from the dataset utilized, N-BaIoT, which is regarded as being highly simple and straightforward. However, adversarial attacks such as data and model poisoning dramatically reduced performance, demonstrating the requirement for more effective defenses. An FL-enabled GRU model is proposed in [32] which employed a GRU to find the Mirai attack in an IoT network. However, the proposed model successfully detects the Mirai attack but lacks resilience and robustness while aggregating the gradients at the server. In the same year, an MT-DNN-FL has been proposed in [33] to carry out the work for identifying anomalies in the network. An FDAGMM was given in [34] to address the classic DAGMM’s performance issue for network anomaly detection due to a lack of data.
The author in [35] used the X-IIOTID dataset to prove the effectiveness of their proposed approach for detecting targeted ransomware attacks for IIoT. They used asynchronous peer-to-peer FL and DL algorithms to detect ransomware attacks. The result shows that the proposed approach achieves a detection accuracy of 98.33%. Similarly in [36] author developed safe data sharing architecture for IIoT devices using FL to handle the data breach and achieved an accuracy of 99.79% accuracy over the X-IIoTID dataset.
Despite the efficient anomaly identification achieved by earlier investigations, the following issues still exist. The first open issue is how to provide privacy-preserving intrusion detection. Second, given that clients and servers may be partially honest and how anomaly detection accuracy is improved. Third, the existing techniques are tested on an intrusion dataset created on a traditional network. However, it completely differs from the SM environment as it lacks interoperability and heterogeneity. Thus, in this paper, the FL-enabled deep intrusion detection framework is proposed and tested on the IIoT-based “X-IIoTID” intrusion dataset [37] to solve the above problems in smart manufacturing systems.

3. System Model, Assumptions and Threat Model

3.1. System Model

The system model used in this paper is presented in Figure 1. The proposed FLDID framework consists of edge devices as representative of SM industries, cloud servers/aggregators, and key management centers.
  • Edge Devices: Each edge device is representative of SM industries taking part in the process of collaborative learning. These devices have the local data collected from its associated SM industry and are responsible for building the local DID model using this data. It is also responsible for communicating with the cloud server to send local model parameters, receive aggregated model parameters from the cloud server, and again perform the training on the received model. These steps are recursively performed until convergence. The local model is placed on the edge devices which are capable of performing intrusion detection on their local data. In this work, we used a CNN+LSTM+MLP-based DL model for intrusion detection.
  • Cloud Server: It is accountable for collaboratively building the DID model in a federated way. The cloud server consists of two major functionalities: (a) initialization of global model parameters and sharing it with local edge devices, (b) aggregating the parameters uploaded by edge devices until the model converges and sends it back to the edge devices.
  • Key Management Centre: The KMC is responsible for ensuring secure communication between the cloud server and the edge devices. It establishes a secure channel between them using a Paillier-based cryptosystem. The Paillier cryptosystem is a partially homomorphic encryption scheme that allows operations on encrypted data. KMC is also responsible for generating public and private keys used in the Paillier cryptosystem.

3.2. Assumptions

The major assumptions considered in this work are:
  • Cloud server is considered a trustworthy party but curious, which is honestly performing its assigned task but quite interested in knowing the model gradients.
  • KMC is assumed to be the fully honest party ensuring secure communication between edge devices and the cloud server.
  • Edge devices are considered to be partially trustworthy, as they follow the process but may be curious about the other edge device’s data resources.

3.3. Threat Model

In this work, we considered the cyber threats launched against SM industries along with the threats targeting the federated learning framework. The major threats launched against SM industries are DoS, DDoS, Reconnaissance, Exploitation, Weaponization, RDoS, Crypto Ransomware, Command/Response Injection attacks and many more. We considered all the mentioned cyber threats in one category as attacks for this work.
The threats considered against the FL framework in this work are membership inference attacks, unintentional data leakage and reconstruction through inference, and GANs-based inference attacks.

4. Materials and Methods

This section presents the elaboration of the proposed FLDID framework by first outlining the overall workflow of the framework, followed by introducing the Deep Intrusion Detection model designed for intrusion detection, and then discussing the Paillier encryption scheme used for securing the communication between edge devices and the server.
Algorithm 1 presents the complete procedure of the proposed FLDID framework. The performance of deep learning models can be enhanced by collaboratively training the model on multiple data resources which consist of a variety of attack examples. Thus, the proposed FLDID framework is designed to allow collaborative learning between different SM industries and to build a robust and comprehensive intrusion detection model using federated learning with secure communication. The major phases of the proposed FLDID framework are described below:
Algorithm 1 Secured FL procedure
Input: Set of Edge devices E n and their associated local data D n | n N , No. of communication rounds R
Output: Global DID model
  1: Cloud server initialize model parameter W 0 and η , B , ζ , ρ , τ
  2: Each E n informs the data size | D n | to server;
  3: Server computes contribution ratio α n = | D n | / ( | D 1 | + | D 2 | + + | D N | ) ;
  4: For each E n KMC generates key pair ( P u b K , P r i K ) using K e y G e n ( n ) and establishes secure channel between each edge device and server;
  5: For r = 1 to R;
   (i) E n computes r t h round model gradients W n r using Algorithm 2;
   (ii) Encrypt model gradients W n r as E ( W n r ) = E n c r y p t _ g r a d ( W n r , P u b K ) ;
   (iii) Upload E ( W n r ) to cloud server;
   End
  6: Cloud server aggregates E ( W n r ) as C = A g g r _ g r a d ( E ( W 1 r ) , ( W 2 r ) , α 1 , α n ) ;
  7: Server distributes C to all edge devices E n
  8: To obtain new global model E n performs decryption as W r ˜ = D e c r y p t _ g r a d ( C , P r i K )
  9: E n updates model gradients using W r ˜ ;
  10: r r + 1 ;
  • Step 1 (Model initialization): In this step, the server selects and sends the initial parameters W 0 for the DID model and other necessary parameters required for model training such as: Batch size B, Learning rate η , loss function ζ , momentum ρ , and decay τ to the edge devices. Moreover, each edge device E n associated with SM industries S n informs the server about the size of the data D n it has from the industry, where n N = 1 , 2 , , N , this helps the cloud server to calculate the contribution ratio α n for each edge device. A positive integer R defines the number of communication rounds between the edge devices and the cloud server.
  • Step 2 (Key generation): In addition to the above parameters, next the public key P u b K and the private key P r i K are generated using K e y G e n ( n ) by the KMC which is used in Paillier encryption to establish a secure path between the server and edge device.
  • Step 3 (Local model training): Based on the initial model parameters W 0 , η , B , ζ ,   ρ ,   τ received from the cloud server, each edge device performs the model training on their local data D n . The model used for training at the edge devices is described in Section 4.1. In the proposed DID model, a hybrid CNN+LSTM+MLP model is used to train the model for detecting intrusions in smart manufacturing. The elaborated training process is presented in Algorithm 2.
  • Step 4 (Gradient encryption): After training the model on the local data each edge device E n encrypts the model gradients W n r using E n c r y p t _ g r a d ( W n r , P u b K ) , where W n r are the model gradients after training at edge device E n in the r t h round. Then, the encrypted gradients E ( W n r ) of the local models by each edge device are sent to the cloud for aggregation to generate the comprehensive global model.
  • Step 5 (Global model construction): Cloud server aggregates the encrypted model gradients received from each edge device participating in the process of collaborative learning. The gradients are aggregated using A g g r _ g r a d ( E ( W 1 r ) , E ( W 2 r ) , E ( W n r ) , α 1 , α n ) , where α n is contribution ratio of each edge device. Then the aggregated encrypted gradients are sent back to edge devices as a cipher text C.
  • Step 6 (Local model updation): At each edge device after receiving the global model (aggregated gradients) as a cipher text, each edge device performs decryption D e c r y p t _ g r a d ( C , P r i K ) using the private key. After receiving the decrypted gradients W r ˜ , local DID models are then updated and retrained with their local data.
Algorithm 2 DL model training
Input:  W 0 , η , B , ζ , ρ , τ
Output:  W n r
  1: Divide D n , into equal size B batches with feature vector x;
  2: Set W n r with initial values;
  3: For each Batch;
     c 1 Forward x to C o n v 1 ;
     c 2 Forward c 1 to C o n v 2 ;
     λ Flatten ( c 2 ) ;
     H Forward λ to L S T M 1 ;
     μ Forward H to L S T M 2 ;
     M Forward μ to D e n s e ;
     γ Dropout ( M ) ;
     ν Forward γ to Output(Sigmoid);
  4: Compute loss function using:
     ζ = 1 B i = 0 1 x i . l o g x ^ i + ( 1 x i ) . l o g ( 1 x ^ i ) ;
  5: Update W n r ;
  6: Repeat until ζ converges;

4.1. Proposed Deep Intrusion Detection Model

This section presents the hybrid deep learning-based intrusion detection model. The designed DID model consists of the pre-processing unit, and a CNN and LSTM unit followed by an MLP unit as shown in Figure 2.
The approach followed provides a diverse combination of convolutional and recurrent neural networks. As network traffic events follow time series patterns, it is possible to categorize the present network connection record using the traffic connection records from the past. We feed freshly produced features from CNN’s unit to LSTM and sequentially to MLP in order to capture the time series patterns over time-steps and obtain the desired result.
The proposed DID model was selected following rigorous experimentation of several DL techniques, including CNN, MLP, and LSTM with different numbers of layers, as well as their topologies, network parameters, network architecture and hybrid combinations. CNN and its variations in our experimental setup and dataset outperforms traditional ML classifiers on comparing with them. The capacity of CNN to extract high-level feature representations, which represent the abstract form of low-level feature sets of network traffic links, is the fundamental driver for this success. The combination of two-layer CNN, two LSTM layers, and a densely integrated MLP layer produced the best results on the dataset considered in this work. Therefore, we decided to incorporate this model as an intrusion detection model into our proposed federated learning architecture to detect cyber threats in smart manufacturing. Each unit of the proposed DID model is described below:

4.1.1. Pre-Processing Unit

First, the data is pre-processed and given to the input layer. Data pre-processing is an important step as all the ML algorithms deal with numerical data. So the features that are of string types need to be label encoded. The numerical data that is obtained after the label encoding does not correspond to the same range. So, to normalize all the feature values, the min-max normalization technique is used [38]. This makes all the feature values come under a similar range. The minimum value of the feature transforms into 0, the maximum value transforms into 1, and every other value gets transformed between 0 and 1. So, the final range of the values of the feature is in between [0, 1].

4.1.2. CNN Unit

CNN is employed in the proposed DID model to extract fine-grained characteristics. Two (1-D) CNN layers constitute this unit. Each layer constitutes convolution, batch normalization, and pooling layers. CNN’s local perception and weight sharing can enhance model learning by significantly reducing the number of parameters. These modules build layered structures that increasingly draw out more precise information by stacking convolutional layers and achieve sampling aggregation by employing pooling layers. Each convolution layer comprises convolution kernels. The layer of batch normalization enables the network’s layers to learn more independently. The output of the earlier layers is normalized using it. Batch normalization helps in high-yield learning and also prevents the over-fitting of the model. It serves as a bridge between the pooling layer and the convolution layer. As a result of this unit, a sequence of m features with size ( n m ) is achieved, where n specifies the length.
Following the convolution operation of the convolution layer and batch normalization layer, the features received possess high dimensionality. Thus, to reduce the feature dimension and training cost pooling layer is also employed. Given one-dimensional data from the time series events collected from SM industries as input vector x = ( x 1 , x 2 , x n , l ) , where ( x n R d is the features available and l R is the class label) being the input of the designed model, first given to the CNN unit. In this unit, a feature map z m a p is constructed by the 1D convolution layer using convolution operation with filter ω R z d . From the available features z, a new feature map z m a p is obtained as:
θ j z m a p = t a n h ( ω z m a p x j : j + z 1 + a )
where a R denotes the bias, filter θ is applied to each feature set z to obtain the feature map as
θ = [ θ 1 , θ 2 , , θ n z + 1 ]
further, this output is sent to the batch normalization and pooling layer. The complete process of the CNN unit is represented as
c 1 = C o n v 1 ( x )
c 2 = C o n v 2 ( c 1 )
λ = F l a t t e n ( c 2 )
where C o n v 1 and C o n v 2 represent the convolutional blocks with batch normalization and pooling operation in the CNN and c 1 , c 2 are the hidden vectors. Further, the output of the second convolution block is flattened using the flatten layer and λ is the final output of the CNN units. λ is the m feature sequence of length n and can be represented as ( n m ) .

4.1.3. LSTM Unit

The output of CNN is used as input to LSTM in the envisaged DID module. LSTM is the superior version of Recurrent Neural Network (RNN). Instead of using standard simple RNN units, LSTM uses memory blocks to handle the issue of disappearing and shattering gradients. LSTM manages long-term dependencies far more easily than conventional RNNs. This shows that LSTMs are capable of remembering and connecting knowledge that is far older than the present [39]. A memory block in an LSTM is a relatively sophisticated processing unit made up of one or more memory cells. LSTM uses gates such as forge gates F T , input gates I T , and output gates O T . Two multiplicative gates make up the input and output gates. The LSTM gate structures are defined as:
F T = φ ( W F · [ H T 1 , X T ] + b F ) ,
I T = φ ( W I · [ [ H T 1 , X T ] + b I ) ,
S ˜ T = t a n h ( W C · [ [ H T 1 , X T ] + b C ) ,
S T = F T S T 1 + I T S ˜ T ,
O T = φ ( W O · [ [ H T 1 , X T ] + b O ) ,
H T = O T t a n h ( C T ) ,
where W F , W I , W C , W O , and b F , b I , b C , b O are the weight metrics and bias vectors for input X T at time step T. ∗ represents the element-wise multiplication, S T represents the cell state. H T 1 and H T are the hidden layer states at step T 1 and at T, respectively. φ is the activation function used.
In this study, LSTM is designed to aid precise prediction in the time series data to find anomalies. LSTM processes λ (output of CNN unit) in the following way:
H = L S T M 1 ( λ ) ,
μ = L S T M 2 ( H )

4.1.4. MLP Unit

The MLP module is composed of a dense layer and an output layer separated by a dropout layer. In order to avoid model over-fitting, the output of the LSTM μ in this module is provided as input to an MLP unit with dropout as follows:
M = D e n s e ( μ )
γ = D r o p o u t ( M )
ν = O u t p u t ( S i g m o i d ( γ ) )
where D e n s e and O u t p u t are the two fully connected layers, D r o p o u t represents the dropout layer. M and γ are the output of dense layer 1 and the dropout layer, respectively. Additionally, because the output predicted class contains two values, either attack or normal, the output of the MLP dropout layer is passed to the output layer with the sigmoid function.
We utilized binary cross entropy as the loss function since the proposed DID model uses binary classification to identify attack and non-attack traces in the smart manufacturing industries, which is defined as follows:
ζ = 1 B i = 0 1 x i . l o g x ^ i + ( 1 x i ) . l o g ( 1 x ^ i )
where B is the batch size, x i is the corresponding target value and x ^ i is the corresponding predicted value.
Algorithm 2 shows the steps involved in training the local models at each edge device. Each edge device E n trains the local model on their local data D n . On each communication round, upon receiving cipher text C, each edge device decrypts it and obtains new gradients W r ˜ and updates W r accordingly. After updation, the DID model is retrained at each edge device E n on their local data D n until model convergence.

4.2. Encryption Method for Secure Communication

In order to ensure the privacy of data and model gradients, many encryption methods have been developed. Although, none of the methods are capable of performing computations on the encrypted data. Thus, to handle such issues and in order to mitigate malicious eavesdroppers and other attacks against the FL framework as mentioned in Section 3.3, the Paillier-based encryption method is used. It is a type of partial homomorphic encryption scheme which is capable of performing computations of encrypted data.
In this encryption scheme, the key management center is only responsible for the generation of public and private keys for the clients but has no access to the data. KMC does not even have any idea about what data is being encrypted by the clients.
In the case of the server, the data received here is in the form of cipher text which is encrypted by the clients. Moreover, the operations performed at the server are all homomorphic operations which are performed without the decryption process. So even if the server is compromised no plain text data is obtained, because at the server all the data is in encrypted form.
From clients, they obtain the key pair from KMC, then encrypt the gradients and send it to the server for aggregation. The server sends back the global model but in encrypted form. During the entire process, clients cannot access each other’s data or the gradients which can ensure data security.
This process is majorly performed in three steps:
  • K e y G e n : The key management center generates the Public key P u b K = ( p , q ) and Private key P r i K = ( δ , κ ) using Paillier cryptosystem as mentioned in [40].
  • E n c r y p t _ g r a d : Here, the model gradients W n r are encrypted using P u b K ( p , q ) and results in E ( W n r ) . For example, if m is the plain text and C is the cipher text the encryption is represented as:
    C = q m . r p m o d p 2
    where r is random number such that r < p .
  • D e c r y p t _ g r a d : Each edge device performs decryption upon receiving the cipher text C from the cloud server and retrieves the updated gradients W r ˜ . The decryption is performed on C using the private key P r i K ( δ , κ ) to obtain the plaintext m.
    m = L ( C δ m o d p 2 ) ( q δ m o d p 2 ) m o d p

Analysis of Encryption Scheme

As far as the overhead and complexity of the encryption scheme are considered, each edge device E n is required to perform the encryption and decryption task and it can be denoted by:
E n c r y p t _ T C = O ( N R E ( P a i l l i e r ) )
D e c r y p t _ T C = O ( N R D ( P a i l l i e r ) )
where R is the number of communication rounds and N is the number of edge devices participating in the process of federated learning. D ( P a i l l i e r ) , and E ( P a i l l i e r ) is the time complexity of the Paillier method, which requires total G exponentiation operation and relatively negligible multiplication operation in each round. Therefore, we can say that the computational cost at each edge device is linearly proportional to the number of gradients in the DL model. However, for the cloud server it only needs to perform X time of additive operation while aggregating the encrypted gradients.
To obtain the overhead of Paillier encryption, the proposed scheme is evaluated for the percentage of CPU consumption, memory occupied, and time taken to build the model. From Table 1, it is evident that the proposed framework with Paillier encryption results in increased CPU and memory consumption with high training time in comparison to the proposed framework without Paillier encryption. This shows that using the Paillier encryption adds an extra overhead to the proposed framework.

5. Results and Discussion

5.1. Environmental Setup and Parameters

The proposed federated learning framework was implemented in Python using TensorFlow (TensorFlow is an open-source library used in Python for deep learning applications) and the designed deep learning model is implemented using Keras (https://keras.io/api/, accessed on 20 July 2022) API. The proposed framework is implemented and evaluated using Python 3.0 on a MacBook pro having an Apple M1 Pro chip with 10-core CPU and 16-core GPU, 16 GB RAM, and 1TB SSD. The parameters used for the FL model and DID model based on the CNN + LSTM + MLP are described in Table 2.

5.2. Dataset Description

Analysis of the proposed framework was performed using the X-IIoTID dataset. X-IIoT is an IIoT-based intrusion dataset that captures the heterogeneity of network traffic as well as system activities produced by diverse IIoT devices. The features in the X-IIoTID dataset are gathered and created from a variety of data sources. The dataset has 68 attributes, including features linked to hosts and network traffic. It covers nine different attack types, including reconnaissance, weaponization, lateral movement, Command and Control (C&C), tampering, Ransom Denial of Service (RDoS), exfiltration, and crypto-ransomware. However, in this work, we are interested in classifying attacks and normal requests. As a result, we grouped them all under the heading “attack”. Classification into numerous attack categories will also be taken into consideration in future development. The X-IIoTID dataset has 820,834 cases with 68 features [37] and two labels (421,417 as normal and 399,417 as attacks). In this work, the data resource is split, with 80% of it being used for training and 20% for testing. The training portion is then further divided into equal portions for each industrial agent, which is used by them to train their local model. Keeping in mind the practical application of the federated framework, a scaling factor (or weightage) is implemented to incorporate the factor of variable data strength offered by different clients, i.e., it takes into account that the data at all the client’s end would not be in equal portions.

5.3. Performance Metrics Used

The metrics used to assess the proposed FLDID framework are classification Accuracy, Precision, Recall, and F1-Score. True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN), are used to express these metrics, respectively, where:
TP:
Specify the count of attack requests rightly predicted as attack;
TN:
Specify the count of benign samples rightly predicted as benign;
FP:
Count of benign requests falsely predicted as attack;
FN:
Count of attack requests falsely predicted as benign.
  • Accuracy: It is the percentage of the right prediction of attack and benign requests
    Accuracy = ( TP + TN ) ( TP + TN + FP + FN )
  • Recall: It is defined as the ratio of right prediction of attack to the all observations in actual class
    Recall = TP ( TP + FN )
  • Precision: It is the ratio of right prediction of benign request to the entire predicted benign requests.
    Precision = TP ( TP + FP )
  • F1-Score: This score is the measure of test’s accuracy and calculated using Precision and Recall.
    F 1 - Score = 2 ( ( Recall Precision ) ( Recall + Precision ) )

5.4. Result Evaluation

To evaluate the performance of the proposed FLDID framework, experiments are conducted under four scenarios in which the number of edge devices considered is N = 2, 5, 10, and 15, respectively. For each scenario, the number of rounds considered is R = 2, 4, 6, 8, and 10. Table 3 shows the obtained results of the proposed FLDID framework for the metrics defined in Section 5.3.
For all the scenarios, it is seen that the FLDID framework performs well on all the metrics. It is worth noting that with the proposed framework for the different number of edge devices, we achieved good accuracy, precision, recall and F-Score in all the scenarios.
The proposed FLDID framework is also compared with individual CNN, LSTM, and MLP models in a federated way to show the domination of the proposed model in comparison to individual DL models. Figure 3 shows that the proposed model overperforms on all the matrices in comparison to the individual models.
Moreover, to show the effectiveness of the proposed approach, the results are also evaluated on different data sizes. As shown in Figure 4, it is observed that with less data (insufficient traces) model does not achieve good accuracy, but with the increased data size (sufficient traces) good accuracy can be achieved. Therefore, federated learning is used in this work to overcome the problem of limited data for training the model and ensuring data privacy as well.

5.4.1. Performance Comparison with Centralized and Isolated Models

In this section, the FLDID is compared with the central and isolated model. In a centrally built ideal model, the central entity uses all the data to build the model. While with the isolated model, the model is built at each edge device with limited data available to them. While evaluating the centralized model, it is assumed that all the smart industries allow their data to be used by the central entity to build the model. However, in isolated models smart industries do not share their data, they build the model with the limited data available to them.
Figure 5 shows the performance of the proposed, centralized and isolated model for different metrics under different scenarios for 10 rounds. As we can observe that the local models do not perform satisfactorily in comparison to the proposed models in all the scenarios due to limited data availability while training the model. Moreover, it can be seen that the proposed model gives good results and almost performs similarly to the centralized (ideal) model. However, with centralized model data privacy cannot be achieved as all the smart industries have to provide their data to the central entity for model building. However, with the proposed framework similar performance for intrusion detection can be achieved while preserving data privacy. However, with federated learning sometimes trustworthy but curious clients and servers may cause data inference attacks. As the model gradients are sent from clients to servers, which can be used in the inference attack. Thus, to ensure the privacy of model gradients and save the data from inference attacks, Paillier-based encryption is also used. However, using encryption increase the overhead of the proposed framework.

5.4.2. Performance Comparison with Baseline Studies

In this section, we present the comparison of the proposed FLDID framework with some state-of-the-art studies that use the federated learning framework. The existing work considered for comparison are: (1) in the work [41] author used a simple MLP-based FL framework for intrusion detection in the health care domain; (2) in [32], GRU-based FL framework for intrusion detection in IIoT domain is used; (3) in [42], the author presents a CNN-based FL framework for the request classification. These baseline studies are re-implemented in our experimental setup and compared with the proposed FLDID framework on the X-IIoTID dataset.
Figure 6 shows the performance comparison for accuracy and F-score of FLDID with the baseline studies for the different number of edge devices, N = 2, 5, 10, 15. It is worth noting that the proposed FLDID framework outperforms all the baseline studies and achieved the highest accuracy and F-Score.

5.4.3. Performance Comparison of Proposed Model with ML Classifiers

The proposed FLDID framework is also compared with ML models. The ML models considered are Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Logistic Regression (LR), and Decision Tree (DT). On comparing as mentioned in Table 4, it is observed that the proposed FLDID framework and DT outperforms SVM, LR, and KNN classifiers and achieves good accuracy which is more than 99%. Moreover, KNN, DT, LR and the proposed framework consume fewer resources compared to SVM. However, as we are using a hybrid of CNN+LSTM+MLP-based deep learning model with federated learning to increase the detection accuracy, thus it results in high training time in comparison to LR, KNN, and DT. Although DT and KNN perform almost similarly to the proposed framework, they fail to ensure data privacy between different industrial agents while training the model. However, the proposed framework wins over in this context and ensures data privacy along with high accuracy which is the major concern in our scenario.

6. Conclusions

This work proposes a federated learning-enabled deep intrusion detection framework to detect cyber threats in smart manufacturing industries. The proposed framework enables multiple smart manufacturing industries to collaboratively build a comprehensive intrusion detection model through their representative edge devices. Moreover, in this work, the deep learning-based DID model using hybrid CNN+LSTM+MLP is used for intrusion detection. The experimental results show that the proposed FLDID framework outperforms the other state-of-the-art approaches and achieves good results for detecting cyber threats in smart manufacturing industries. While building the model collaboratively, the proposed framework also ensures it is built in a privacy-preserving way. The privacy of model parameters is achieved by building a secure channel between the edge devices and the cloud server using partial homomorphic encryption, i.e., the Paillier encryption method. However, homomorphic encryption will unavoidably result in increased overhead for the encryption and decryption process, which will substantially limit the effectiveness of training.
Therefore, in future work, the performance of the learning process will be accelerated by using efficient homomorphic encryption methods which results in low overhead. Moreover, a more robust and personalized federated learning should be considered, which helps to divide similar clients into clusters and handles the data poisoning attack. Additionally, to identify different types of attacks, we concentrate on providing the multiclass classification framework.

Author Contributions

Conceptualization, P.V., J.G.B. and D.O.; methodology, P.V.; formal analysis, P.V.; investigation, P.V.; writing—original draft preparation, P.V.; supervision, J.G.B. and D.O.; project administration, J.G.B. and D.O.; funding acquisition, P.V. All authors have read and agreed to the published version of the manuscript.

Funding

This work has emanated from research supported by Science Foundation Ireland under the Grant 16/RC/3918 (Confirm) and European Union’s H2020 programme under Marie Sklodowska-Curie grant agreement No. 847577.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used for this study are publicly available and can be downloaded at https://www.kaggle.com/datasets/munaalhawawreh/xiiotid-iiot-intrusion-dataset (accessed on 20 July 2022).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AIArtificial Intelligence
CNNConvolutional Neural Network
CPSCyber Physical Systems
C&CCommand and Control
DDoSDistributed Denial of Service
DIDDeep Intrusion Detection
DLDeep Learning
DoSDenial of Service
FDAGMMFederated Deep Auto encoding Gaussian Mixture Model
FLFederated Learning
FLDIDFederated Learning enabled Deep Intrusion Detection
FNFalse Negative
FPFalse Positive
GRUGated Recurrent Unit
IDSIntrusion Detection Systems
IIoTIndustrial Internet of Things
KMCKey Management Centre
LSTMLong Short Term Memory
MLMachine Learning
MLPMulti Layer Perceptron
MT-DNN-FLMulti-Task Deep Neural Network in Federated Learning
RDoSRansom DoS
RNNRecurrent Neural Network
TNTrue Negative
TPTrue Positive
SMSmart Manufacturing

References

  1. Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
  2. Sari, A.; Lekidis, A.; Butun, I. Industrial networks and IIoT: Now and future trends. In Industrial IoT; Springer: Berlin/Heidelberg, Germany, 2020; pp. 3–55. [Google Scholar]
  3. Bao, H.; Lu, R.; Li, B.; Deng, R. BLITHE: Behavior rule-based insider threat detection for smart grid. IEEE Internet Things J. 2015, 3, 190–205. [Google Scholar] [CrossRef]
  4. Hao, M.; Li, H.; Luo, X.; Xu, G.; Yang, H.; Liu, S. Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans. Ind. Inform. 2019, 16, 6532–6542. [Google Scholar] [CrossRef]
  5. Li, B.; Lu, R.; Wang, W.; Choo, K.K.R. DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2415–2425. [Google Scholar] [CrossRef]
  6. Dhirani, L.L.; Armstrong, E.; Newe, T. Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap. Sensors 2021, 21, 3901. [Google Scholar] [CrossRef] [PubMed]
  7. Flechais, I.; Sasse, M.A.; Hailes, S.M. Bringing security home: A process for developing secure and usable systems. In Proceedings of the NSPW03: New Security Paradigms and Workshop, Ascona, Switzerland, 18–21 August 2003; pp. 49–57. [Google Scholar]
  8. Ismail, M.; Shaaban, M.F.; Naidu, M.; Serpedin, E. Deep learning detection of electricity theft cyber-attacks in renewable distributed generation. IEEE Trans. Smart Grid 2020, 11, 3428–3437. [Google Scholar] [CrossRef]
  9. Yang, J.; Zhou, C.; Yang, S.; Xu, H.; Hu, B. Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans. Ind. Electron. 2017, 65, 4257–4267. [Google Scholar] [CrossRef] [Green Version]
  10. Tuptuk, N.; Hailes, S. The Cyberattack on Ukraine’s Power Grid Is a Warning of What’s to Come. Conversation 2016, 52832, 847–855. Available online: http://theconversation.com/thecyberattack-on-ukraines-power-grid-is-a-warning-ofwhats-tocome (accessed on 20 July 2022).
  11. Maiziere, T. Die Lage Der It-Sicherheit in Deutschland 2014; Bundesamt für Sicherheit in der Informationstechnik: Bonn, Germany, 2014. [Google Scholar]
  12. Zhang, K.; Zhu, Y.; Maharjan, S.; Zhang, Y. Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things. IEEE Netw. 2019, 33, 12–19. [Google Scholar] [CrossRef]
  13. Qiu, C.; Yu, F.R.; Yao, H.; Jiang, C.; Xu, F.; Zhao, C. Blockchain-based software-defined industrial Internet of Things: A dueling deep Q-learning approach. IEEE Internet Things J. 2018, 6, 4627–4639. [Google Scholar] [CrossRef]
  14. Savazzi, S.; Nicoli, M.; Rampa, V. Federated learning with cooperating devices: A consensus approach for massive IoT networks. IEEE Internet Things J. 2020, 7, 4641–4654. [Google Scholar] [CrossRef]
  15. Samarakoon, S.; Bennis, M.; Saad, W.; Debbah, M. Federated learning for ultra-reliable low-latency V2V communications. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar]
  16. Wang, S.; Tuor, T.; Salonidis, T.; Leung, K.K.; Makaya, C.; He, T.; Chan, K. Adaptive federated learning in resource constrained edge computing systems. IEEE J. Sel. Areas Commun. 2019, 37, 1205–1221. [Google Scholar] [CrossRef] [Green Version]
  17. Qi, J.; Yang, P.; Newcombe, L.; Peng, X.; Yang, Y.; Zhao, Z. An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure. Inf. Fusion 2020, 55, 269–280. [Google Scholar] [CrossRef]
  18. Qi, J.; Yang, P.; Waraich, A.; Deng, Z.; Zhao, Y.; Yang, Y. Examining sensor-based physical activity recognition and monitoring for healthcare using Internet of Things: A systematic review. J. Biomed. Inform. 2018, 87, 138–153. [Google Scholar] [CrossRef]
  19. Huang, C.; Min, G.; Wu, Y.; Ying, Y.; Pei, K.; Xiang, Z. Time series anomaly detection for trustworthy services in cloud computing systems. IEEE Trans. Big Data 2017, 8, 60–72. [Google Scholar] [CrossRef]
  20. Meng, W.; Tischhauser, E.W.; Wang, Q.; Wang, Y.; Han, J. When intrusion detection meets blockchain technology: A review. IEEE Access 2018, 6, 10179–10188. [Google Scholar] [CrossRef]
  21. Shone, N.; Ngoc, T.N.; Phai, V.D.; Shi, Q. A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2018, 2, 41–50. [Google Scholar] [CrossRef] [Green Version]
  22. Diro, A.; Chilamkurti, N.; Nguyen, V.D.; Heyne, W. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms. Sensors 2021, 21, 8320. [Google Scholar] [CrossRef] [PubMed]
  23. Taghavinejad, S.M.; Taghavinejad, M.; Shahmiri, L.; Zavvar, M.; Zavvar, M.H. Intrusion detection in IoT-based smart grid using hybrid decision tree. In Proceedings of the 2020 6th International Conference on Web Research (ICWR), Tehran, Iran, 22–23 April 2020; pp. 152–156. [Google Scholar]
  24. Wu, D.; Jiang, Z.; Xie, X.; Wei, X.; Yu, W.; Li, R. LSTM learning with Bayesian and Gaussian processing for anomaly detection in industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 5244–5253. [Google Scholar] [CrossRef] [Green Version]
  25. Doshi, R.; Apthorpe, N.; Feamster, N. Machine learning ddos detection for consumer internet of things devices. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018; pp. 29–35. [Google Scholar]
  26. Zuo, Y.; Wu, Y.; Min, G.; Huang, C.; Pei, K. An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 548–561. [Google Scholar] [CrossRef]
  27. Zhao, R.; Yan, R.; Chen, Z.; Mao, K.; Wang, P.; Gao, R.X. Deep learning and its applications to machine health monitoring. Mech. Syst. Signal Process. 2019, 115, 213–237. [Google Scholar] [CrossRef]
  28. Ma, T.; Wang, F.; Cheng, J.; Yu, Y.; Chen, X. A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 2016, 16, 1701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  29. Brun, O.; Yin, Y.; Gelenbe, E.; Kadioglu, Y.M.; Augusto-Gonzalez, J.; Ramos, M. Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In Proceedings of the First International ISCIS Security Workshop 2018, London, UK, 26–27 February 2018; pp. 79–89. [Google Scholar]
  30. Potluri, S.; Diedrich, C. Accelerated deep neural networks for enhanced intrusion detection system. In Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, Germany, 6–9 September 2016; pp. 1–8. [Google Scholar]
  31. Rey, V.; Sánchez, P.M.S.; Celdrán, A.H.; Bovet, G. Federated learning for malware detection in iot devices. Comput. Netw. 2022, 204, 108693. [Google Scholar] [CrossRef]
  32. Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.R. DÏoT: A federated self-learning anomaly detection system for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar]
  33. Zhao, Y.; Chen, J.; Wu, D.; Teng, J.; Yu, S. Multi-task network anomaly detection using federated learning. In Proceedings of the SoICT 2019: The Tenth International Symposium on Information and Communication Technology, Hanoi Ha Long Bay, Vietnam, 4–6 December 2019; pp. 273–279. [Google Scholar]
  34. Chen, Y.; Zhang, J.; Yeo, C.K. Network anomaly detection using federated deep autoencoding Gaussian mixture model. In Proceedings of the International Conference on Machine Learning for Networking, Paris, France, 3–5 December 2019; pp. 1–14. [Google Scholar]
  35. Al-Hawawreh, M.; Sitnikova, E.; Aboutorab, N. Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT. IEEE Access 2021, 9, 148738–148755. [Google Scholar] [CrossRef]
  36. Makkar, A.; Kim, T.W.; Singh, A.K.; Kang, J.; Park, J.H. SecureIIoT Environment: Federated Learning empowered approach for Securing IIoT from Data Breach. IEEE Trans. Ind. Inform. 2022, 18, 6406–6414. [Google Scholar] [CrossRef]
  37. Al-Hawawreh, M.; Sitnikova, E.; Aboutorab, N. X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things. IEEE Internet Things J. 2021, 9, 3962–3977. [Google Scholar] [CrossRef]
  38. Patro, S.; Sahu, K.K. Normalization: A preprocessing stage. arXiv 2015, arXiv:1503.06462. [Google Scholar] [CrossRef]
  39. Sun, P.; Liu, P.; Li, Q.; Liu, C.; Lu, X.; Hao, R.; Chen, J. DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur. Commun. Netw. 2020, 2020, 8890306. [Google Scholar] [CrossRef]
  40. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238. [Google Scholar]
  41. Schneble, W.; Thamilarasu, G. Attack detection using federated learning in medical cyber-physical systems. In Proceedings of the 28th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 25–28 July 2022; pp. 1–8. [Google Scholar]
  42. Chen, Y.; Qin, X.; Wang, J.; Yu, C.; Gao, W. Fedhealth: A federated transfer learning framework for wearable healthcare. IEEE Intell. Syst. 2020, 35, 83–93. [Google Scholar] [CrossRef]
Figure 1. System architecture for proposed framework.
Figure 1. System architecture for proposed framework.
Sensors 22 08974 g001
Figure 2. Architecture of designed DL model.
Figure 2. Architecture of designed DL model.
Sensors 22 08974 g002
Figure 3. Comparison of proposed model with individual DL models.
Figure 3. Comparison of proposed model with individual DL models.
Sensors 22 08974 g003
Figure 4. Model accuracy with different data sizes.
Figure 4. Model accuracy with different data sizes.
Sensors 22 08974 g004
Figure 5. Performance comparison of FLDID with centralized and isolated models with different numbers of edge devices for R = 10: (a) N = 2, (b) N = 5, (c) N = 10, (d) N = 15.
Figure 5. Performance comparison of FLDID with centralized and isolated models with different numbers of edge devices for R = 10: (a) N = 2, (b) N = 5, (c) N = 10, (d) N = 15.
Sensors 22 08974 g005
Figure 6. Performance comparison of FLDID with state-of-the-art approaches with different number of edge devices for R = 10: (a) N = 2, (b) N = 5.
Figure 6. Performance comparison of FLDID with state-of-the-art approaches with different number of edge devices for R = 10: (a) N = 2, (b) N = 5.
Sensors 22 08974 g006
Table 1. Comparison of proposed framework with and without Paillier encryption.
Table 1. Comparison of proposed framework with and without Paillier encryption.
Proposed FrameworkCPUMemoryTime (in s)
Without Paillier encryption20%72%3042
With Paillier encryption83%88%76,920
Table 2. Parameters used in the proposed model.
Table 2. Parameters used in the proposed model.
FL ModelLearning rate (0.01), Momentum (0.9), decay (0.01), loss function (binary cross-entropy), epoch (10), number of clients (K = 2, 5, 10, 15)
DID Model (CNN + LSTM + MLP)No. of hidden layers (11), dropout rate (0.2), CNN Layer 1 (filters (128), kernel size (3), activation function (relu)), CNN Layer 1 (filters (64), kernel size (3), activation function (relu)), pooing size (2), strides (2), LSTM layers (perceptron (50), activation function (tanh)), MLP layer (perceptron (100), activation function (tanh), output layer activation function (sigmoid)), optimizer (adam), loss (binary cross entropy)
Table 3. Performance of FLDID framework under 4 different scenarios.
Table 3. Performance of FLDID framework under 4 different scenarios.
NRAccuracyPrecisionRecallF-Score
220.990320.995550.984490.98999
40.991830.9946 0.988570.99157
60.992590.99470.990040.99237
80.993060.993680.992040.99286
100.993480.99634 0.990220.99327
520.99373 0.995730.991350.99353
40.994090.996210.991610.9939
60.99415 0.99577 0.992190.99398
80.994150.996260.991690.99397
10 0.99428 0.99665 0.991570.9941
102 0.99432 0.99645 0.991860.99415
4 0.99434 0.99637 0.991980.99417
6 0.99437 0.99642 0.991980.99419
8 0.99443 0.99654 0.991990.99426
10 0.99438 0.99645 0.991980.99421
152 0.99441 0.99654 0.991950.99424
4 0.99443 0.99644 0.99210.99426
6 0.99443 0.99667 0.991850.99426
8 0.99445 0.99657 0.991990.99428
10 0.99447 0.99659 0.992030.9943
Table 4. Performance comparison of proposed model with other ML models.
Table 4. Performance comparison of proposed model with other ML models.
ClassifierAccuracyCPUMemoryTime (in s)
SVM0.922735%90%4265
LR0.914815%80%36.411
KNN0.984714%75%0.6592
DT0.990419%78%4.975
Proposed0.997920%72%3042
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Verma, P.; Breslin, J.G.; O’Shea, D. FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries. Sensors 2022, 22, 8974. https://doi.org/10.3390/s22228974

AMA Style

Verma P, Breslin JG, O’Shea D. FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries. Sensors. 2022; 22(22):8974. https://doi.org/10.3390/s22228974

Chicago/Turabian Style

Verma, Priyanka, John G. Breslin, and Donna O’Shea. 2022. "FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries" Sensors 22, no. 22: 8974. https://doi.org/10.3390/s22228974

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop